Many Millions of Linux are affected by this security hole
Posted: Wed 20 Jan 2016, 06:58
READ-ONLY Archive
https://oldforum.puppylinux.com/
Code: Select all
$ ./cve_2016_0728 PP_KEY
uid=1000, euid=1000
Increfing...
finished increfing
forking...
finished forking
caling revoke...
uid=1000, euid=1000
$ id -u
1000
$ id -un
alpha
I worked at a top three security documents company and transfer programs between investment group banking and Federal Reserve.. I also do NOT do online banking. There is solid active involvement realtime to stop those problems but I only saw it at the intrabank leveleric52 wrote:Thanks GCM, I'm glad I never gave in to the temptation to bank online.
For Puppy where users run as root anyway ... users gaining access to root isn't a vulnerability ... its a feature. Therefore only if you're running servers is this a issue, otherwise just count it as anti-Linux noise.Vulnerability allows restricted users and apps to gain unfettered root access
Ha! another reason to stick with Slacko 5.6The flaw, which was introduced into the Linux kernel in version 3.8 released in early 2013, resides in the OS keyring
You must have something wrong on your head Bindee. I did not say that this thread is a troll story; I am saying that you --> "DALEB" <-- is a troll, another sockpuppet from the troll Bindee.Daleb wrote:user jamesbond says this is a troll story
http://www.murga-linux.com/puppy/viewto ... 124#883124
Puppy runs as root.It’s pretty bad because a user with legitimate or lower privileges can gain root access and compromise the whole machine
...
an attacker would require local access to exploit the vulnerability on a Linux server
Okay what I gained from reading the link is that my test to elevate6502coder wrote:Much ado about not a lot, according to ZDNet:
http://www.zdnet.com/article/how-to-fix ... o-day-flaw
Code: Select all
cat /proc/cpu | grep smep
Code: Select all
> zgrep X86_SMAP /proc/config.gz
CONFIG_X86_SMAP=y
Well put indeed. This is FUD at best... as are most of these supposed 'exploits' or 'flaws'. Linux is about 95+% secure from this crap (assuming you don't run WINE) -- not by design, but because nobody of consequence in any position to create an exploit like that actually cares about Linux anything anywhere. It is wasted time and productivity better spent elsewhere. The few exceptions to this rule (Wikipedia has a page on them) are not really worth mentioning -- a double handful (maybe) of abortive efforts, all at least five years out of date (and I want to say more like fifteen for most). A goodly percentage aren't even in circulation anymore as I understand it. They have been completely eradicated.mavrothal wrote:Would be nice if people bather to look past the headlines and look a bit further.Puppy runs as root.It’s pretty bad because a user with legitimate or lower privileges can gain root access and compromise the whole machine
...
an attacker would require local access to exploit the vulnerability on a Linux server
Puppy is NOT multi-user.
Puppy (usually) is not a server.
So, yes this is a kernel bug that can affect servers and multiuser machines given that someone has local access to it.
If someone has local access to your puppy I do not think will require any bug exploit.
Regarding Android, the user must install the malicious app (none know yet)...
Very well put, starhawk. Couldn't have put it better myself.starhawk wrote:Well put indeed. This is FUD at best... as are most of these supposed 'exploits' or 'flaws'. Linux is about 95+% secure from this crap (assuming you don't run WINE) -- not by design, but because nobody of consequence in any position to create an exploit like that actually cares about Linux anything anywhere. It is wasted time and productivity better spent elsewhere. The few exceptions to this rule (Wikipedia has a page on them) are not really worth mentioning -- a double handful (maybe) of abortive efforts, all at least five years out of date (and I want to say more like fifteen for most). A goodly percentage aren't even in circulation anymore as I understand it. They have been completely eradicated.mavrothal wrote:Would be nice if people bother to look past the headlines and look a bit further.Puppy runs as root.It’s pretty bad because a user with legitimate or lower privileges can gain root access and compromise the whole machine
...
an attacker would require local access to exploit the vulnerability on a Linux server
Puppy is NOT multi-user.
Puppy (usually) is not a server.
So, yes this is a kernel bug that can affect servers and multiuser machines given that someone has local access to it.
If someone has local access to your puppy I do not think will require any bug exploit.
Regarding Android, the user must install the malicious app (none know yet)...
Viruses, worms, trojans, etc are about MONEY, just like everything else in this world. Money, and want of it, and greed over it. Think of all the fake antivirus crap that Windows users get, begging them to install backdoor-laden programs that just spew out more of the same. Look at Cryptolocker and its ilk. Not to mention that "FBI" virus that had people mail prepaid Wal*Mart cards to strange addresses. Yes, all of those actually WORKED, at least enough to satisfy their creators.
There is no meaningful market for that trash here on Linux, and there never has been, because not enough people are willing to move here from The Dark Side to make it worthwhile. (Perhaps we should be thankful, particularly given the state of modern computer education...) If M$ ever goes under *and* people don't just shuffle over to That Fruit Company and get their daily dose of bloated disposable crapware from there, then we might at that point have something to talk about.
In the meantime, Shakespeare said it best. "Much ado about nothing." A statement particularly true, in this case, of Puppy Linux as a whole.
'Nuff said, really.This, according to another programmer working on mediating the problem, is far from unique. "Security companies are always making a big deal of little problems for their own benefit."